Results 51 to 60 of about 6,594 (201)

Model checking of trusted cryptographic module

open access: yesTongxin xuebao, 2010
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj   +2 more sources

Investigating Developer Sentiments in Software Components: An Exploratory Case Study of Gentoo

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Developers, who are the main driving force behind software development, have central work in handling software components such as modules, libraries, and frameworks, which are the backbone of a project's architecture. Managing these components well ensures the smooth implementation of new features, maintains system integrity, and ...
Tien Rahayu Tulili   +2 more
wiley   +1 more source

Analysis of cyberspace security based on game theory

open access: yes网络与信息安全学报, 2015
Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and
Jian-ming ZHU, Qin WANG
doaj   +3 more sources

Blockchain‐Based Federated Learning Methodologies in Smart Environments for Drone Technology

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
High‐security transactions are stored in a chain of blocks using blockchain technology. Security and privacy concerns may be addressed by using blockchain technology. Federated learning is a paradigm for increasing data mining accuracy and precision by ensuring data privacy and security for both internet of things (IoT) devices and users in smart ...
Mukkoti Maruthi Venkata Chalapathi   +6 more
wiley   +1 more source

Expert Consensus‐Based Technical Guidelines for Remote Robotic‐Assisted Surgery and Procedures

open access: yesWorld Journal of Surgery, EarlyView.
Remote robotic‐assisted surgery and procedures offer significant potential to enhance access to surgical expertise, optimize patient outcomes, improve healthcare efficiency, reduce costs, and increase patient and provider satisfaction, aligning with the quintuple aim.
Yulun Wang   +9 more
wiley   +1 more source

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

open access: yesIEEE Access, 2018
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj   +1 more source

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking

open access: yesIEEE Access, 2018
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha   +3 more
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Formal verification for a PMQTT protocol

open access: yesEgyptian Informatics Journal, 2020
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam   +3 more
doaj  

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy